Analysis of security data from a large computing organization | IEEE Conference Publication | IEEE Xplore